CompTIA SY0-601 CompTIA Security+ Exam Online Training
CompTIA SY0-601 Online Training
The questions for SY0-601 were last updated at Nov 19,2024.
- Exam Code: SY0-601
- Exam Name: CompTIA Security+ Exam
- Certification Provider: CompTIA
- Latest update: Nov 19,2024
A company has discovered unauthorized devices are using its WIFI network, and it wants to harden the access point to improve security.
Which of the following configuration should an analysis enable to improve security? (Select TWO.)
- A . RADIUS
- B . PEAP
- C . WPS
- D . WEP-EKIP
- E . SSL
- F . WPA2-PSK
During an incident a company CIRT determine it is necessary to observe the continued network-based transaction between a callback domain and the malware running on an enterprise PC.
Which of the following techniques would be BEST to enable this activity while reducing the risk of lateral spread and the risk that the adversary would notice any changes?
- A . Physical move the PC to a separate internet pint of presence
- B . Create and apply micro segmentation rules.
- C . Emulate the malware in a heavily monitored DM Z segment.
- D . Apply network blacklisting rules for the adversary domain
Which of the following environment utilizes dummy data and is MOST to be installed locally on a system that allows to be assessed directly and modified easily wit each build?
- A . Production
- B . Test
- C . Staging
- D . Development
A desktop support technician recently installed a new document-scanning software program on a computer. However, when the end user tried to launch the program, it did not respond.
Which of the following is MOST likely the cause?
- A . A new firewall rule is needed to access the application.
- B . The system was quarantined for missing software updates.
- C . The software was not added to the application whitelist.
- D . The system was isolated from the network due to infected software
A company recently experienced an attack during which its main website was Directed to the attacker’s web server, allowing the attacker to harvest credentials from unsuspecting customers.
Which of the following should the company implement to prevent this type of attack from occurring In the future?
- A . IPsec
- B . SSL/TLS
- C . ONSSEC
- D . SMIME
A security engineer is installing a WAF to protect the company’s website from malicious web requests over SSL.
Which of the following is needed to meet the objective?
- A . A reverse proxy
- B . A decryption certificate
- C . A split-tunnel VPN
- D . Load-balanced servers
A security analyst has received several reports of an issue on an internal web application. Users state they are having to provide their credentials twice to log in. The analyst checks with the application team and notes this is not an expected behavior.
After looking at several logs, the analyst decides to run some commands on the gateway and obtains the following output:
Which of the following BEST describes the attack the company is experiencing?
- A . MAC flooding
- B . URL redirection
- C . ARP poisoning
- D . DNS hijacking
A company recently experienced an attack during which 5 main website was directed to the atack-er’s web server, allowing the attacker to harvest credentials from unsuspecting customers.
Which of the following should the company Implement to prevent this type of attack from occurring in the future?
- A . IPSec
- B . SSL/TLS
- C . DNSSEC
- D . S/MIME
A security engineer is installing a WAF to protect the company’s website from malicious web requests over SSL.
Which of the following is needed to meet the objective?
- A . A reverse proxy
- B . A decryption certificate
- C . A spill-tunnel VPN
- D . Load-balanced servers
Which of the following BEST describes a social-engineering attack that relies on an executive at a small business visiting a fake banking website where credit card and account details are harvested?
- A . Whaling
- B . Spam
- C . Invoice scam
- D . Pharming